Submission Summary:

What's been foundSeverity Level
Contains characteristics of an identified security risk.

 

Technical Details:

 

Possible Security Risk

Threat CategoryDescription
A malicious trojan horse or bot that may represent security risk for the compromised system and/or its network environment

 

File System Modifications

#Filename(s)File SizeFile HashAlias
1 %Temp%\Client.class 1,458 bytes MD5: 0x7B749E8353C14C09C9722E3F9D064D7A
SHA-1: 0x5BD2122E993D954A7105813210E069360ADDCE7F
Trojan.Gen [PCTools]
Trojan.Gen [Symantec]
Troj/JavaDl-J [Sophos]
Trojan.Java.Downloader.G [Ikarus]
Java/Downloader [AhnLab]
2 %Temp%\META-INF\MANIFEST.MF 104 bytes MD5: 0xED46D842AEF7DFD4B31AE8E7F9056ED4
SHA-1: 0x00C90390BD67397C43EED9CDB1083F8F6EB8F437
(not available)
3 %Temp%\META-INF\MICROSOF.RSA 949 bytes MD5: 0x578C84067467C237754E18740389DD76
SHA-1: 0x2935017C1BB128B749A4019513F6DD327438F8DF
(not available)
4 %Temp%\META-INF\MICROSOF.SF 257 bytes MD5: 0x63B8F5641C1CFF304025A2B880E0E8EE
SHA-1: 0x1EEA8B9A6D1512B6A98B6D760F6CCFF1D3DEE52A
(not available)
5 [file and pathname of the sample #1] 2,345 bytes MD5: 0x1C0CA8F4EB0B90462D83031F40ACB83D
SHA-1: 0x8FD96D41E7D33071468CE35B31BF7EC792CF01E5
Trojan.Gen [Symantec]
Trojan.Java.Downloader.G [Ikarus]

 

 

All content ("Information") contained in this report is the copyrighted work of Threat Expert Ltd and its associated companies ("ThreatExpert") and may not be copied without the express permission of ThreatExpert.

The Information is provided on an "as is" basis. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.

Copyright © 2014 ThreatExpert. All rights reserved.